Computer and Network Security

Computer and Network Security

10th Grade

20 Qs

quiz-placeholder

Similar activities

أمن المعلومات والبيانات

أمن المعلومات والبيانات

1st Grade - Professional Development

18 Qs

Unit 3 System Hardening Quiz

Unit 3 System Hardening Quiz

10th Grade

15 Qs

CSEC Information Technology: Computer Crimes pt2

CSEC Information Technology: Computer Crimes pt2

10th Grade

20 Qs

CYBERSECURITY EXAM

CYBERSECURITY EXAM

9th - 12th Grade

20 Qs

Networking Essentials Chapter 6 Review

Networking Essentials Chapter 6 Review

9th Grade - University

25 Qs

1.3.2.8 Telecomms (Security) Act 2021 and Digital Economy Act

1.3.2.8 Telecomms (Security) Act 2021 and Digital Economy Act

9th - 10th Grade

16 Qs

IT biztonság tesztkérdések tanulása 2

IT biztonság tesztkérdések tanulása 2

5th - 12th Grade

20 Qs

Computer Networks Quizs

Computer Networks Quizs

9th - 12th Grade

20 Qs

Computer and Network Security

Computer and Network Security

Assessment

Quiz

Computers

10th Grade

Medium

Used 1K+ times

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

It helps keep data and equipment safe by giving only the appropriate people access.
network security
firewall
antivirus
security threats

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

When an employee intends to cause damage 
Malicious Threats
Accidental Threats
Data Security Attacks
Physical Security Attacks

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

When the user damages data or equipment unintentionally
Malicious Threats
Accidental Threats
Physical Security Threats
Data Security Threats

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Events or attacks that steal, damage, or destroy equipments.
Malicious Threats
Accidental Threats
Data Security Threats
Physical Security Threats

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Events or attacks that remove, corrupt, deny access to, allow access to, or steal information.
Malicious Threats
Accidental Threats
Data Security Attacks
Physical Security Attacks

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

It uses available resources, such as passwords or scripts.
Accidental Threats
Malicious Threats
Structured Attacks
Unstructured Attacks

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

It uses code to access operating systems and software.
Structured Attacks
Unstructured Attacks
Malicious Threats
Accidental Threats

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?